Adversaries are becoming increasingly proficient at cyber attacks against command and control infrastructure. Maintaining security requires high-fidelity assessments of software services, e.g., through exercises in which Systems Under Test are subjected t